Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200406-17
(IPsec-Tools: authentication bug in racoon)

The KAME IKE daemon racoon is used to authenticate peers during Phase 1
when using either preshared keys, GSS-API, or RSA signatures. When using
RSA signatures racoon validates the X.509 certificate but not the RSA
signature.

Impact

By sending a valid and trusted X.509 certificate and any private key an
attacker could exploit this vulnerability to perform man-in-the-middle
attacks and initiate unauthorized connections.

Workaround

There is no known workaround at this time. All users are encouraged to
upgrade to the latest available version.